Professional Documents
Culture Documents
Adobe Scan 20-Sep-2022
Adobe Scan 20-Sep-2022
7
Introduction
Looking at the evolution of the computing hardware itself, from the first
generation to the current (fourth) generation of computers, shows how we got from
there to here. The hardware, however, was only part of the evolutionary process.
As hardware evolved, so did software. As networking evolved, so did the rules
for how computers communicate. The development of such rules, or protocols, also
helped drive the evolution of Internet software.
Establishing a common protocol for the Internet led directly to rapid growth in
the number of users online.
Today, we talk about the use of IPv6 (Internet Protocol version 6) to mitigate
addressing concerns and for improving the methods we use to communicate over the
Internet.
The first step along the evolutionary path of computers occurred in 1930,
when binary arithmetic was developed and became the feundation of
computer processing technology, terminology, and programming languages.
Calculating devices date back to at least as early as 1642, when a device
that could mechanically add numbers was invented. Adding devices evolved
from the abacus. It was a significant milestone in the history of computers.
In 1939, the Berry brothers invented an electronic computer capable of
operating digitally. Computations were performed using vacuum-tube
technology.
Cloud Comp
23 at theOerman
Zue'y 23 German Ia
Lahoratory 19
Kofn l ue
Konnd
I n t r o d u c t i o n
in the
iflcant events
evolution of
nredoction
9 1 ,e most signil
war one ofthe foating-point and
supported both
oth
Aviai in Berlin
h e e this
machine
"Turing-complete"
device,
binary
mpus
Berause it was a
hc that was fully operati.
ational
finst computer
eidered to he the very
Ra nplete if it falls into
langunge is
considered
1luring-compl
that it can s
the
Apro
programming
class as a
Turing
machine, meaning
perform.
form
ae
computational machine can
universal Turing
caleulation a
any
years,
computer rototypes
pro were builtto
next two
of the U.S. Army,
Over the course
German messages
by the
decode secret
1.8.1.1 P i r s t - G e n e r a t i o n C o m p u t e r s
if the match count for a setting was above a predetermined threshold, that Another general-purpose computer of this era was ENIAC (Electronic
data match would be sent as character output to an electric Numerical Integrator and Computer, shown in Figure 1.5), which was built
typewriter.
in 1946. This was the first Turing-complete, digital computer capable of
being reprogrammed to solve a full range of computing problems, although
earlier machines had been built with some of these properties.
Coud Com
inereaned stoage and
like the IBM 360
t r o e t
an achievement for which he received the Nobel Prize in Physics in 2000, have increased by many orders of magnitude since the invention ofthe 4004
processor, the technology large-scale
for integration (LSI) or very-large-
L2.1.3 Third-Generation Computers
scale integration (VLS) microchips has not changed
all that much. For this
Kilby's invention started an explosion in third-generation computers. Even of today's computers still fall into the category
of fourth-
reason, most
though the finst integrated circuit was produced in September generation computers.
micochips were not used in computers until 1963. 1958,
1.2.2 Internet Software Evolution
The first, Vannevar Bush, wrote a visionary description of the potential uses
for information technology with his description of an automated library
Figurs 1.6 The intel 404
processor system named MEMEX (see Figure 1.7).
ofmany possible alternatives and formulate the best courcor action Jutcomes
to take.
Aaadher example can be 1ound in scientific
environments, where certain
simulations (such as molccular modeling) and complex mathematical
problems can be split apart and each part processed simultaneously,
Arehtectures
Architectures
Compilers
Parallel Era Applications
Problem-Solving Environments
- -. .--- - -- -- -
1940 1950 1960 1970 1980 1990 2000 2010 2020 2030
The term parallel computing has blurred its edges with the term disth
computing and is often used in place of the latter term. In thissecti
refer to its proper characterization, which involves the introduat
parallelism within a single computer by coordinating theactivilyol
processors together.
1.3.3.1 What is parallel processing?
Processing of multiple tasks simultaneously on multiple proces
iple&
parallel processing. The parallel program consists O1
processes (tasks) simultaneously solving a given problenm chniqu
divided into multiple subtasks using a divide-and-conguc
Security of data on the cloud can be questionable.
1.7 ELASTICITY IN CLOUD
In cloud computing, Elasticity is defined as "the degree to which a system is
able to adapt to workload changes by
provisioning and de-provisioning resources
in an autonomic manner, such that at each point in time the available resources
match the current demand as closely as possible"
Example :
m a c h i n e s
i n e s
tha
ten w
woou
ulld
d
be
bDe
The
machine
again.
again. m a c h i n e
Introduction becomes
unnp
poop
puul
laar
r
a n d aa
single system
idle and
elastic
the
website
An a
annd
aremostly
d
At time
ime
2,
t12, website
the
website.
machines
m a c h i n e s
allocated
to the accessing nine
n ine
c u r r e n t l ya l l o are
who deprovision
ovision
should to the
cloud
them with
release
service
allocated
to a
r e s o u r c e
under-provisioning.
amount
of
the or
Purpose at matching
avoiding
over-
should
aims
Elasticity requires, required,
it actually than
the
amount of resource allocating
more
r e s o u r c e s
r e s o u r c e s
that are
wastes
$2,095 e v e r y
costs and
service provider
than o p t i m a l
instance
the
one is required, are higher
when only expenses
service
provider's
the
Hence,
must
reduced.
their profit is resources
than required,
fewer service.
U n d e r - p r o v i s i o n i n g ,
i.e., allocating its users
with a good
serve
seemn
the service cannot
make it
otherwise
the website may
be avoided, the
above example,
under-provisioning
11. Ephemeral storage tied to the node that expires with the node
2 Block storage that acts like a SAN and persists across time
To secure your network within the cloud, you can control virtual firewat
rules that define how traffic can be filtered to your virtual nodes. ewal
You define routing rules by creating security groups and associating the
rules with those groups.
For example, you might create a DMZ group that allows port 80 and pon
443 traffic from the public Internet into its servers, but allows no other
incoming traffic.
4
Problems
One potential problem is that elasticity takes time. A cloud virtual machine (VM)
can be acquired at any time by the user, however, it may take up to several minutes
for the acquired VM to be ready to use. The VM startup time is dependent on
1actors, such as image size, VM type, data center location, number of VMs,|
etc. Cloud providers have different
VM startup performance. This implies any
control mechanism designed for elastic applications must consider
inits decisiou
process the time needed for the elasticity actions to take effect,ol suchas
provisioning another VM for a specific application component.
2. Monitoring elastie applieations 1.8
troduction
Elasticity requirements
between cost and quality or performance, for real world cloud users requirements
of
regarding the behavior are more complex and target multiple dimensions
elasticity (e.g., SYBL).
.8 CLOUD PROVISIONING